20th week of 2016 patent applcation highlights part 69 |
Patent application number | Title | Published |
20160142174 | MOBILE DEVICE PREVENTION OF CONTACTLESS CARD ATTACKS - Technologies related to mobile device prevention of contactless card attacks are generally described. In some examples, a mobile computing device may monitor for electromagnetic signals at frequencies used for short range communications with contactless cards. Detection of such electromagnetic signals by the mobile computing device may indicate an attack attempt on a proximal contactless card. In response to detection of such electromagnetic signals, the mobile computing device may automatically generate a disruption signal effective to disrupt communications between contactless card readers and any proximal contactless cards, to thereby foil the attack before sensitive contactless card data is stolen. | 2016-05-19 |
20160142175 | ADAPTIVE CYCLIC CHANNEL CODING FOR ORTHOGONAL FREQUENCY DIVISION MULTIPLEXED (OFDM) SYSTEMS - A method and apparatus for an orthogonal frequency division multiplexed (OFDM) communication system for communication in the presence of cyclostationary noise is provided. A receiver receives from a medium a channel measurement packet of a communication channel. The channel measurement packet has a measured transmission characteristic. The measured transmission characteristic of the received channel measurement packet is compared to a defined transmission characteristic to provide a comparison. A modulation coding scheme (MCS) map referenced to a phase of a cyclostationary noise period of the medium is generated based upon the comparison. The MCS map is sent to a transmitter via the medium. Signals including packets that have been mapped to subcarriers based on the MCS map are received from the medium. Subcarriers of the signals received from the medium are demapped using the MCS map referenced to the phase of the cyclostationary noise period of the medium. | 2016-05-19 |
20160142176 | ENHANCING MODULATION AND CODING SCHEME SELECTION AND MEDIUM ACCESS CONTROL PROTOCOL DATA UNIT AGGREGATION BASED ON UNDER-UTILIZATION - Methods, apparatus, and computer-readable media for wireless communication by an access point (AP) may involve communicating with a station using a first modulation and coding scheme (MCS). An under-utilization of a medium access control (MAC) protocol data unit (MPDU) aggregation of the station while using the first MCS may be identified. The under-utilization may be caused by packet error rate (PER)-induced head of line (HOL) blocking. The MCS may be switched to a second MCS that is lower than the first MCS. | 2016-05-19 |
20160142177 | Rate Indication and Link Adaptation for Variable Data Rates in Long Range Wireless Networks - A method of fast link adaptation for Bluetooth long-range wireless networks is provided. A data packet comprises a preamble, a first packet portion including a rate indication field, and a second packet portion including a PDU. The first packet portion is encoded using a first modulation and coding scheme with a first rate while the second packet portion is encoded using a second modulation and coding scheme with a second rate indicated by the RI field. A transmitter thus can use different MCS options to support variable data rates by adapting to channel conditions, and then uses the novel RI field to indicate the data rate to a receiver dynamically. As a result, fast link adaptation can be achieved for different applications with different rate requirements, to provide higher data rate, reduce connection time, lower power consumption, and improve link quality. | 2016-05-19 |
20160142178 | DIGITAL BROADCASTING SYSTEM AND METHOD OF PROCESSING DATA IN DIGITAL BROADCASTING SYSTEM - The present invention provides a method of processing data. The method of processing data includes receiving a broadcasting signal where mobile service data are multiplexed with main service data, extracting transmission-parameter-channel signaling information and fast-information-channel signaling information from a data group within the received mobile service data; obtaining first program table information describing virtual channel information of an ensemble and a service provided by the ensemble using the fast-information-channel signaling information, the ensemble the ensemble corresponding to a virtual channel group of the received mobile service data, obtaining information indicating that second program table information, which describes an additional service provided by the ensemble, is included in the ensemble and parsing the second program table information according to the obtained information; and providing the additional service by using the second program table information. | 2016-05-19 |
20160142179 | Optimization of Optical Transmission Capacity - A method for transmitting a coherent optical data signal includes receiving a data signal from an interface, and encoding the data signal with a forward error correcting (FEC) encoder according to a mix of modulation formats. The FEC encoder generates an FEC encoded signal which is used to generate modulation symbols according to the modulation formats. The FEC encoded signal of modulation symbols is spectrally shaped to generate a shaped signal, and pre-distorted before transmission. The shaped signal is pre-distorted by adding a predetermined amount of chromatic dispersion to generate a smoothed signal, and the smoothed signal is transmitted according to the modulation formats. | 2016-05-19 |
20160142180 | IMPROVED RECEIVER FOR WIRELESS COMMUNICATIONS NETWORKS - A receiver receiving in a cell at least first and second data streams included in at least first and second signals. The receiver includes: a first estimating unit configured to receive the first and second signals and provide an estimate of first data on the first data stream; a regenerating unit configured to provide a regenerated first data stream based on the first data estimate and attenuation of first radio channels transmitting the first data stream; a second estimating unit configured to provide an estimate of second data on the second data stream based on the regenerated first data stream, on the first and second signals, on attenuation of second radio channels transmitting the second data stream, and on inter/intra-cell interference; and first and second extractions units configured to extract first and second information within the first and second data based on the estimates of the first and second data. | 2016-05-19 |
20160142181 | VECTOR SIGNALING WITH REDUCED RECEIVER COMPLEXITY - Methods and apparatuses are described to determine subsets of vector signaling codes capable of detection by smaller sets of comparators than required to detect the full code. The resulting lower receiver complexity allows systems utilizing such subset codes to be less complex and require less power. | 2016-05-19 |
20160142182 | DEMODULATION TECHNIQUE - A technique for assessing the reliability of bits received by a modulation symbol on a channel is provided. A providing circuit provides an input dataset including a plurality of input values. The input values correspond to different transmit hypotheses according to a modulation alphabet used for encoding the bits in the symbol. A computing circuit performs a first computing step and a second computing step. In the first computing step, a first intermediary dataset is computed by combining the input values of the input dataset according to a first combination scheme. In the second computing step, a second intermediary dataset is computed by combining the input values of the input dataset according to a second combination scheme. The second combination scheme is different from the first combination scheme. An assessing circuit assesses the reliability of the bits based on the first intermediary dataset and the second intermediary dataset. | 2016-05-19 |
20160142183 | BIT PARSER FOR INTERLEAVER IN TRANSMITTER WITH MULTIPLE TRANSMIT ANTENNAS - A transmitter having two or more transmit antennas includes a bit parser for providing two or more data streams to an interleaver of the transmitter. The bit parser receives bits representing data to be transmitted over the transmit antennas, and parses the bits into a number of data streams equal to a number of the transmit antennas such that the bits are divided into bit groups, each having no more than two of the bits, and each of the data streams include non-adjacent ones of the bit groups. | 2016-05-19 |
20160142184 | METHOD FOR REPORTING A RADIO LINK CONTROL RE-TRANSMISSION FAILURE AND A DEVICE THEREFOR - The present invention relates to a wireless communication system. More specifically, the present invention relates to a method and a device for reporting an RLC (Radio Link Control) re-transmission failure in the wireless communication system, the method comprising: communicating with both the first BS and the second BS, wherein the first BS has a Radio Resource Control (RRC) connection with the UE; and reporting to the first BS, a Radio Link Control (RLC) retransmission error without RRC connection re-establishment for the first BS if the RLC retransmission error occurs in an RLC entity transmitting RLC PDU (Protocol Data Unit) to the second BS. | 2016-05-19 |
20160142185 | METHOD AND APPARATUS FOR MULTICAST BLOCK ACKNOWLEDGEMENT - A method for wireless communications is disclosed that includes generating and interpreting multicast block acknowledgement frames. Group identifiers and apparatus identifiers are used for indicating the presence of aggregated acknowledgement information and for extracting acknowledgement information for individual stations. | 2016-05-19 |
20160142186 | LOAD MODULATION-BASED BEAMSPACE MIMO TRANSMISSION METHOD AND APPARATUS - Disclosed are a load modulation-based beamspace MIMO transmission method and apparatus. The beamspace MIMO transmission apparatus may include a plurality of impedance loading circuits each including a plurality of imaginary impedance devices, a beamspace MIMO control unit calculating loading values of the plurality of imaginary impedance devices, corresponding to a spatial multiplexing orthogonal frequency division multiplexing (OFDM) sample, and an RF chain unit generating a first signal having a predetermined carrier frequency. | 2016-05-19 |
20160142187 | TONE PLANS FOR WIRELESS COMMUNICATION NETWORKS - Methods and apparatuses for communicating over a wireless communication network are disclosed herein. One example apparatus includes a memory that stores instructions. The apparatus further includes a processor coupled with the memory. The processor and the memory are configured to determine a total bandwidth for a transmission of a message, the total bandwidth including a plurality of tones. The processor is further configured to divide the plurality of tones in the total bandwidth into one or more 26-, 52-, 106-, 242-, or 996-tone blocks. The processor is further configured to determine an indication. The indication assigns one or more of the one or more tone blocks to a first wireless communication device. The apparatus further includes a transmitter configured to transmit the indication to at least the first wireless communication device or a second device. | 2016-05-19 |
20160142188 | TERMINAL DEVICE, BASE STATION DEVICE, INTEGRATED CIRCUIT, AND WIRELESS COMMUNICATION METHOD - A subframe in a certain cell that satisfies criteria which includes at least a criterion (i) is regarded as being valid as a CSI reference resource. In a case where, in the criterion (i), information which is signaled on a PDCCH and that indicates an UL-DL configuration for a cell is detected, the UL-DL configuration for the cell is given by the information. In a case where, in the criterion (i), the information is not detected, the UL-DL configuration for the cell is same as an UL-DL configuration that is indicated by a higher layer parameter. The criterion (i) stipulates that, in a case where multiple cells with different UL-DL configurations are aggregated and the terminal device is not capable of simultaneous reception and transmission in the multiple cells, a subframe in a primary cell is a DL subframe or a special subframe that is indicated by an UL-DL configuration for the primary cell. | 2016-05-19 |
20160142189 | METHOD AND APPARATUS FOR TRANSMITTING REFERENCE SIGNAL, METHOD AND APPARATUS FOR MEASURING AND REPORTING CHANNEL STATE INFORMATION, AND METHOD FOR CONFIGURING THE SAME - A method in which a base station transmits a CSI (channel state information)-RS (reference signal) in a MIMO (multiple input multiple output) antenna system is provided. The base station periodically transmits a CSI-RS for first CSI to a terminal. The base station requests the terminal to transmit second CSI in a first subframe. When a CSI-RS occasion is configured, the base station transmits a CSI-RS for the second CSI to the terminal for a duration of the CSI-RS occasion from a second subframe or to the second subframe, which is a subframe after a first offset configured for CSI-RS transmission from the first subframe. | 2016-05-19 |
20160142190 | Transmission of Reference Signals - Resources for reference signalling on at least one component carrier of a plurality of aggregated component carriers can be determined by a station. Information indicative the at least one component carrier and the associated resources is then communicated to another station for configuration of the other station. A trigger is then sent for reference signalling, and in response to the trigger, at least one reference signal is sent from the other station using the indicated at least one component carrier and resources. | 2016-05-19 |
20160142191 | APPARATUS CONFIGURED TO REPORT APERIODIC CHANNEL STATE INFORMATION ?FOR DUAL CONNECTIVITY - Embodiments of a system and method for reporting channel state information (CSI) in a wireless network are generally described herein. In some embodiments, an apparatus of a User Equipment (UE) can include physical layer circuitry to receive, in a first subframe, a first aperiodic CSI request from a first cell group, and a second aperiodic CSI request from a second cell group. The UE can include processing circuitry to determine a number of requested CSI processes corresponding to the first aperiodic CSI request and the second aperiodic CSI request. Additionally, the processing circuitry can select a subset of the requested CSI processes when the determined number of requested CSI processes is more than five. Furthermore, the processing circuitry can calculate CSI for the selected CSI processes. | 2016-05-19 |
20160142192 | TECHNIQUES FOR TRANSMITTING PREAMBLES OVER AN UNLICENSED RADIO FREQUENCY SPECTRUM BAND - A device may determine that an unlicensed radio frequency (RF) spectrum band is available for a communication. The device may transmit a first transmission indicator that indicates that the device is transmitting information via the unlicensed RF spectrum band. The first transmission indicator may be associated with a first radio access technology. The device may transmit a second transmission indicator that indicates that the device is transmitting information via the unlicensed RF spectrum band. The second transmission indicator may be associated with a second radio access technology that is different from the first radio access technology. | 2016-05-19 |
20160142193 | RADIO BASE STATION, USER TERMINAL, RADIO COMMUNICATION METHOD AND RADIO COMMUNICATION SYSTEM - The present invention is designed to realize non-orthogonal multiple access while reducing the decrease of throughput. A radio base station selects a predetermined decoding pattern, based on channel state information of a user terminal, from among a plurality of decoding patterns in which information regarding the order of decoding of the non-orthogonal multiple access signals and/or whether or not SIC (Successive Interference Cancellation) is applied is defined, and transmits information to represent the selected decoding pattern to the user terminal, and the user terminal receives the information to represent the decoding pattern, and cancels interference in accordance with the order of decoding and SIC based on the decoding pattern that is shown in the received information. | 2016-05-19 |
20160142194 | MOBILE STATION - A delay in transmission of “RRC connection reconfiguration complete” is avoided during execution of “Inter-eNB CA”. A mobile station UE according to the present invention includes a RRC message processing unit | 2016-05-19 |
20160142195 | RADIO BASE STATION APPARATUS, MOBILE TERMINAL APPARATUS AND RADIO COMMUNICATION SYSTEM - Provided are a radio base station apparatus, a mobile terminal apparatus and a radio communication method capable of taking other-cell interference mitigation measures even in consideration of inter-cell coordination like CoMP. The radio communication method according to the present invention is characterized by, in a radio base station apparatus, generating notification information including subframe information of a serving cell and subframe information of another cell; and transmitting the notification information to a mobile terminal apparatus connected to the serving cell as a connected cell; and in the mobile terminal apparatus, receiving the notification information including the subframe information of the connected cell and the subframe information of another cell; and measuring channel quality of the connected cell with use of the subframe information of the connected cell and measuring channel quality of another cell with use of the subframe information of another cell. | 2016-05-19 |
20160142196 | MULTIPLE DATA SERVICES OVER A DISTRIBUTED ANTENNA SYSTEM - Supporting multiple time division duplexed (TDD) based wireless services or frequency division duplexed (FDD) wireless services on a Distributed Antenna System (DAS). TDD based services use a common clock signal to synchronize the components of the DAS for transmission and reception of TDD signals. The DAS can include a GPS receiver which can extract a timing signal from a GPS signal and distribute the timing signal to any and all components of the DAS to enable synchronization of the components for transmitting and receiving TDD signals. The GPS receiver can be part of the interface that connects a TDD based service to the DAS or separate component of the DAS. The DAS can distribute a reference clock signal to all of the components of the DAS in order to maintain zero frequency shift while manipulating with the carrier frequencies of the various wireless services carried by the DAS. | 2016-05-19 |
20160142197 | Transmission Method and Reception Method for Data and Control Information, Base Station and Terminal - Disclosed in the present invention are a transmission method and a reception method for data and control information, an eNB and a user equipment, wherein the transmission method includes: an eNB transmitting data and/or downlink control information to a user equipment within a service range in TDD special subframes in accordance with specific rules; wherein the specific rules are pre-configured in the eNB or pre-indicated by the eNB to the user equipment via a high-layer signaling; wherein, a serving cell in which the user equipment is located currently performs a coordinated multiple-point (CoMP) transmission with one or more other cells and has an independent TDD special subframe configuration compared with other cells. The eNB includes a memory module and a transmitting module. | 2016-05-19 |
20160142198 | RF DUPLEXING DEVICE - Radio frequency (RF) duplexing devices and methods of operating the same are disclosed. In one embodiment, an RF duplexing device includes a transmission port, a receive port, a first duplexer, and a second duplexer. The first duplexer is coupled to the transmission port and the receive port, and is configured to provide a first phase shift from the transmission port to the receive port. The second duplexer is also coupled to the transmission port and the receive port. However, the second duplexer is configured to provide a second phase shift that is differential to the first phase shift from the transmission port to the receive port. By providing the second phase shift so that the second phase shift is differential to the first phase shift, the RF duplexing device can provide isolation through cancellation without needing to introduce significant insertion losses. | 2016-05-19 |
20160142199 | HIGH-SPEED INTERFACE APPARATUS AND DESKEW METHOD THEREOF - A high-speed interface apparatus and method of correcting skew in the apparatus are provided. A high-speed transmitter includes a transmission D-PHY module that generates and transmits a clock signal through a clock channel, generates a deskew synchronous code and test data in response to a deskew request signal, transmits the deskew synchronous code followed by the test data through a data channel, and transmits a normal synchronous code followed by normal data through the data channel in normal mode. | 2016-05-19 |
20160142200 | Receiver with Clock Recovery Circuit and Adaptive Sample and Equalizer Timing - A receiver is equipped with an adaptive phase-offset controller and associated timing-calibration circuitry that together shift the timing for a data sampler and a digital equalizer. The sample and equalizer timing is shifted to a position with less residual inter-symbol interference (ISI) energy relative to the current symbol. The shifted position may be calculated using a measure of signal quality, such as a receiver bit-error rate or a comparison of filter-tap values, to optimize the timing of data recovery. | 2016-05-19 |
20160142201 | SINGLE WIRE SYSTEM CLOCK SIGNAL GENERATION - This specification describes an integrated circuit comprising: a single wire interface; a clock circuit configured to detect a voltage from the single wire interface and to generate a clock signal having a frequency that is based on the detected voltage; and a digital system coupled with the single wire interface and the clock circuit. The digital system is configured to: receive a data signal from the single wire interface; power the digital system using a power signal from the single wire interface; and perform one or more operations clocked by the clock signal. | 2016-05-19 |
20160142202 | CRYPTOGRAPHIC SHADER IN DISPLAY HARDWARE - A technique is introduced that can securely displaying decrypted images while preventing these decrypted images against an attempt to capture such. Some aspects of the technique include loading a cryptographic shader into a graphics processor unit (GPU) in the recipient's computer device separate from the CPU in the recipient's computer device. In some embodiments, the cryptographic shader that is loaded includes instructions that implement a white-box cryptographic algorithm to decrypt encrypted images. A cryptographic key is integrated within the white-box cryptographic algorithm so that the cryptographic key is protected from extraction. When the GPU receives the encrypted images, the cryptographic shader can perform decryption processes to generate decrypted images. The decrypted images are loaded by the GPU directly from the GPU into a frame buffer such that the decrypted images are to be displayed without any portion of the decrypted images passing through the CPU. | 2016-05-19 |
20160142203 | QUANTUM KEY DISTRIBUTION DEVICE, QUANTUM KEY DISTRIBUTION SYSTEM, AND QUANTUM KEY DISTRIBUTION METHOD - According to an embodiment, a quantum key distribution device includes first and second operation units. The first operation unit is configured to perform a first operation as a key distillation operation. The first operation unit includes a hardware circuit for performing a part of the first operation. The key distillation operation includes a sifting operation for a photon bit string generated through quantum key distribution with another quantum key distribution device via a quantum communication channel. The second operation unit is configured to perform a second operation as a key distillation operation other than the first operation. The second operation unit includes a circuit for a part of the second operation. The first operation unit stores intermediate data generated by the first operation. The second operation unit generates, by the second operation, a cryptographic key being the same as for the another quantum key distribution device from the intermediate data. | 2016-05-19 |
20160142204 | SYSTEM AND METHOD FOR GENERATING A CRYPTOGRAPHIC KEY - A system and method for generating a cryptographic key using a sequence of data segments selected by a user from one or more data resources. Raw data from the one or more data resources corresponding to each of the selected data segments, and the sequence in which such data segments are selected, is extracted and processed to generate a key. The key can be used for any cryptographic and authentication purpose. By enabling a user to select the sequence of data segments from the one or more data resources in any manner the user desires, the user can create a strong key, but also easily remember the underlying data resource and chosen sequence. This technique provides enhanced security while maintaining ease of creation and use of such security. | 2016-05-19 |
20160142205 | SYMMETRIC SECRET KEY PROTECTION - A system and method includes obtaining a secret key at a processor of a device, obtaining a salt and an environmental variable, generating a cryptographically transformed derived key via the processor of the device using the secret key, the salt, and the environmental variable, storing the derived key in a memory of the device, and using the derived key for cryptographic communications via a network with another device. | 2016-05-19 |
20160142206 | METHOD AND SYSTEM FOR DELEGATING CALCULATION OF A BILINEAR PAIRING VALUE TO A CALCULATION SERVER - One embodiment relates to a method for enabling an entity to delegate calculation of a bilinear pairing value e(A,B) between two values A and B to a calculation server. The entity may select public elements P | 2016-05-19 |
20160142207 | Utilizing data reduction in steganographic and cryptographic systems - The present invention relates to methods for protecting a data signal using the following techniques: applying a data reduction technique to reduce the data signal into a reduced data signal; subtracting the reduced data signal from the data signal to produce a remainder signal; embedding a first watermark into the reduced data signal to produce a watermarked, reduced data signal; and adding the watermarked, reduced data signal to the remainder signal to produce an output signal. A second watermark may be embedded into the remainder signal before the final addition step. Further, cryptographic techniques may be used to encrypt the reduced data signals and to encrypt the remainder signals before the final addition step. | 2016-05-19 |
20160142208 | MULTI-DIMENSIONAL ENCRYPTION - A method of encrypting data is provided. The method includes generating a key and encrypting data using the key. Generating the key includes determining a number of coefficients for a polynomial having a number of variables and selecting a polynomial level from the number of coefficients. Generating the key also includes selecting a first value based on the polynomial level, generating a vector (c) having coefficients based on the polynomial level, and generating a vector (t) based on the polynomial level. Furthermore, generating the key includes generating a vector (t′) based on a product of the vector (c) and the vector (t) and calculating a second value based on the first value, the vector (t), and the product. In addition, generating the key includes comparing the second value with the polynomial level and returning the coefficients of the vector (c) as the number of coefficients for the polynomial. | 2016-05-19 |
20160142209 | METHOD AND SYSTEM FOR SECURING THE ENTRY OF DATA TO A DEVICE - Crypto-glasses include systems that implement a method of authentication of users by blinking, the crypto-glasses including a frame configured so as to be worn by a user, a processor, a display device communicating with the processor so as to dynamically display data, and a communication unit, as executed by the processor, to execute the method of authentication by transmitting data to the display device for performing the authentication of the user to interact with the display device. The communication unit is configured to display in an optical unit of the crypto-glasses a key map which correlates data input into the display device with keys of the display device, the key map indicating data different from that of the keys of the display device | 2016-05-19 |
20160142210 | SIGNATURES FOR NEAR FIELD COMMUNICATIONS - A data-carrying device and methods of authenticating the same are disclosed. The data-carrying device is described as being capable of communicating via the Near Field Communications (NFC) protocol and may have one or more NFC Data Exchange Format (NDEF) records stored in its memory. The data-carrying device also comprises or has the ability to generate a signature that proves the data-carrying device is the authorized device for storing the one or more NDEF records. A data-carrying device that attempts to transmit an NDEF record without a valid signature may be identified as an unauthorized data-carrying device. | 2016-05-19 |
20160142211 | METHOD AND APPARATUS FOR DERIVING A CERTIFICATE FOR A PRIMARY DEVICE - In a method, a secured link is established between a primary device and a secondary device, both of which are assigned to a user. The secondary device receives, on the secured link, a request for a derived certificate for the primary device and a public key generated by the primary device. The secondary device generates the derived certificate for the primary device based on an original certificate issued to the secondary device and transmits, on the secured link, the derived certificate to the primary device. | 2016-05-19 |
20160142212 | TRUSTED PLATFORM MODULE CERTIFICATION AND ATTESTATION UTILIZING AN ANONYMOUS KEY SYSTEM - This application is directed to trusted platform module certification and attestation utilizing an anonymous key system. In general, TPM certification and TPM attestation may be supported in a device utilizing integrated TPM through the use of anonymous key system (AKS) certification. An example device may comprise at least combined AKS and TPM resources that load AKS and TPM firmware (FW) into a runtime environment that may further include at least an operating system (OS) encryption module, an AKS service module and a TPM Certification and Attestation (CA) module. For TPM certification, the CA module may interact with the other modules in the runtime environment to generate a TPM certificate, signed by an AKS certificate, that may be transmitted to a certification platform for validation. For TPM attestation, the CA module may cause TPM credentials to be provided to the attestation platform for validation along with the TPM and/or AKS certificates. | 2016-05-19 |
20160142213 | AUTHENTICATION SERVICE AND CERTIFICATE EXCHANGE PROTOCOL IN WIRELESS AD HOC NETWORKS - A method for protecting data transmission in an ad hoc network including nodes, each node including a private key, a public key and a certificate of the public key signed by a certification authority, the method including transmitting by the first node to the second node: a first message signed with the private key of the first node; a third message containing a first set of initialization data including: a first certificate including the public key of the first node, signed by the certification authority; a second data set including the IP address of the first node; and the first certificate associated with the IP address of the first node, wherein the second data set is signed with the private key of the first node. | 2016-05-19 |
20160142214 | Device to Device Communication Security - An apparatus comprising: a requester configured to request a certificate comprising at least one identifier associated with the apparatus from at least one network node; a first receiver configured to receive the certificate from the at least one network node; and a forwarder configured to forward the certificate to at least one further apparatus; a second receiver configured to receive a further certificate from the further apparatus, the further certificate comprising at least one further identifier associated with the further apparatus; and an authenticated configured to authenticate the further apparatus based on the further certificate. | 2016-05-19 |
20160142215 | METHOD AND APPARATUS FOR MANAGING CERTIFICATES - A certificate management processor (CMP) in a public key infrastructure (PKI) receives a request for a certificate management operation. The CMP determines that the request is associated with at least one of an end entity and a service. The CMP identifies a certificate management identifier associated with at least one of the end entity and the service. The CMP retrieves at least one status associated with the certificate management identifier and/or at least one status associated with the certificate management operation. The CMP performs the certificate management operation on a certificate when the retrieved at least one status is determined to not be suspended. | 2016-05-19 |
20160142216 | METHOD AND APPARATUS FOR AUTOMATING SELECTION OF CERTIFICATE MANAGEMENT POLICIES DURING ISSUANCE OF A CERTIFICATE - A Public Key Infrastructure (PM) device receives a certificate signing request (CSR) from an end entity. The PKI device obtains at least one of: a controlling attribute of at least one PKI device associated with processing of the certificate signing request and a controlling attribute associated with the CSR. The PKI device obtains an end entity policy object (EEPO) to be associated with the end entity based on at least one obtained controlling attribute. Based on the obtained EEPO, the PKI device determines at least one attribute and at least one value associated with the attribute this is to be included in a certificate and issues, to the end entity, the certificate including the at least one attribute. | 2016-05-19 |
20160142217 | DETECTING GROUND ISOLATION FAULT IN ETHERNET PoDL SYSTEM - Circuits and techniques are described for detecting a ground fault leak between the PSE and the PD. Prior to PoDL voltage being applied to the PD, a test switch is temporarily closed for sensing a voltage drop in a loop between the positive terminal of the PSE voltage source and any ground leakage path between the PSE and the PD. If the resistance of the ground leakage path is below a certain threshold, a fault is declared. A similar test may be performed without a test switch by supplying a known test current through the loop and sensing the voltage drop. Another test is to connect the positive terminal of the PSE voltage source to the loop and sense the resulting current. After the full PoDL voltage is applied to the PD, a ground fault may be detected by sensing the equivalence between the source and return PSE currents. | 2016-05-19 |
20160142218 | METHOD AND APPARATUS FOR PROVIDING SERVICE IN USER EQUIPMENT OF MOBILE COMMUNICATION SYSTEM - A method for transmitting and receiving a signal by a terminal in a mobile communication system is provided. The method includes transmitting a first message including information related to a service to a core network, receiving a response to the first message from the core network, and transmitting or receiving traffic related to the service based on the response. | 2016-05-19 |
20160142219 | eMBMS Multicast Routing for Routers - Systems, methods, devices, and non-transitory processor-readable storage media of the various embodiments enable a software enabled access point (“softAP”) computing device to route evolved Multimedia Broadcast Multicast Service (“eMBMS”) multicast (“MCAST”) traffic to connected local area network (“LAN”) client devices. In an embodiment, a self-assigned Internet Protocol (“IP”) address may be assigned to the wide area network (“WAN”) interface of the softAP computing device where eMBMS MCAST traffic may be received and an MCAST routing daemon/utility of the softAP computing device may enable MCAST forwarding from the WAN interface to the LAN interface of the softAP computing device. In an embodiment, an MCAST routing daemon/utility may be modified to accept an alternate network comprising all source IP addresses. | 2016-05-19 |
20160142220 | Method and Apparatus for Processing Multicast Packet on Network Virtualization over Layer 3 (NVO3) Network - A first multihoming network virtualization edge (NVE) configured to receive a first multicast packet sent by a multihomed tenant end system (TES), acquire an ingress port of the first multicast packet and a virtual local area network (VLAN) identifier (ID) of the first multicast packet, acquire a virtual overlay network (VN) ID of the first multicast packet according to the ingress port and the VLAN ID, determine whether the ingress port is a designated forwarder (DF) of the VN ID, encapsulate the first multicast packet with an extended NVO3 header when the ingress port is not the DF of the VN ID, and send the first multicast packet that is encapsulated with the extended NVO3 header to another NVE that includes a second multihoming NVE, where the extended NVO3 header carries the VN ID and a link aggregation group (LAG) ID that corresponds to the ingress port. | 2016-05-19 |
20160142221 | LEVERAGING A FEMTOCELL NETWORK FOR PREMISES MANAGEMENT OR MONITORING - The disclosed subject matter relates to an architecture that can leverage femtocell network infrastructure in order to facilitate premises management or monitoring. In particular, the architecture can leverage the local presence of a home nodeB (HNB) located at a premises associated with a subscriber in order to aggregate, process and/or distribute various state information that can be collected at the premises. | 2016-05-19 |
20160142222 | Data Transmission Method, Apparatus, and System - A data transmission method includes: receiving, by an access gateway, data packets; transmitting, by the access gateway, the data packets to an operator network using a digital subscriber line DSL channel; detecting, by the access gateway, a status of a bandwidth occupied when the data packets are transmitted on the DSL channel; determining, by the access gateway, that the DSL channel cannot satisfy a user requirement and some data packets need to be overflowed; and overflowing, by the access gateway to an LTE channel, the data packets needing to be overflowed, and transmitting the data packets to the operator network using the DSL channel in combination with the LTE channel. | 2016-05-19 |
20160142223 | RF BUS CONTROLLER - A radio frequency (RF) bus controller includes an interface and a processing module. The interface is coupled for communicating intra-device RF bus access requests and allocations. The processing module is coupled to receive an access request to an RF bus via the interface; determine RF bus resource availability; and when sufficient RF bus resources are available to fulfill the access request, allocate, via the interface, at least one RF bus resource in response to the access request. | 2016-05-19 |
20160142224 | APPARATUS AND METHOD FOR REDUCING THE NUMBER OF PORTS ON WHICH FLOODING IS EXECUTED - A transmission device is connected to other transmission devices in a system configured in a ring topology. The transmission device stores, in a memory, port information items identifying a plurality of output ports connected in the ring topology, in association with each of destination information items, where the plurality of output ports form a redundant configuration and are each configured to transfer a communication signal. The transmission device detects switching information in the system which indicates the port information items related to a change in paths of the ring topology, and, with reference to the memory, executes flooding on output ports associated with the port information items, indicated by the switching information, of the redundant configuration connected in the ring topology. | 2016-05-19 |
20160142225 | COMMUNICATION SYSTEM, COMMUNICATION APPARATUS, AND PROTECTION METHOD - A communication system includes two or more ring networks in which nodes are connected in a ring shape, carries out ERP for each of the ring networks, sets one of the ring networks as a major ring that detects a failure in a shared link, and sets the other ring networks as sub rings. A shared node, which terminates the shared link, includes: a failure monitoring unit that respectively detects, concerning two or more of the ring networks that share the shared link, failures in the ring networks; a switching processing unit that determines, on the basis of a detection result of the failures, the ring network set as the major ring; and ERP processing units that store, when the switching is performed by the switching processing unit, identification information after the switching in an R-APS frame and transfer or transmit the frame. | 2016-05-19 |
20160142226 | METHOD FOR PACKET TUNNELING THROUGH SOFTWARE DEFINED NETWORK, METHOD OF INTELLIGENTLY CONTROLLING FLOW OF A PACKET THROUGH SOFTWARE DEFINED NETWORK AND SYSTEM - Embodiments of the disclosure provide a method for packet tunneling through a software defined network (SDN), a method of intelligently controlling flow of a packet through an SDN network, and a system. The method for packet tunneling through an SDN includes: sending programmable instructions to an SDN controller from a processor executing an application program that includes the programmable instructions; wherein the programmable instruction comprises primitive operations regarding processing a packet for tunneling in accordance with a tunneling protocol; configuring a flow table by the first SDN controller in accordance with the programmable instructions; and processing and distributing the packet in accordance with the flow table by the SDN switch. The method may enable a system support multiple tunneling technologies without complicating the implementation of the SDN switch, and enable the system support new tunneling technologies without the need for updating the SDN switch, thereby reducing complexity of the SDN switch. | 2016-05-19 |
20160142227 | SYSTEMS AND METHODS FOR CARRIER FREQUENCY OFFSET ESTIMATION FOR LONG TRAINING FIELDS - This disclosure describes systems, and methods related to determining carrier frequency offset of a wireless communication channel based on a determined phase difference. In some embodiments, an access point is caused to receive one or more streams comprising one or more encoded long training field (LTF) symbols over the wireless communication channel from one or more user devices. The access point then determines a first phase of the wireless communication channel upon receipt of a first LTF symbol, and determines a second phase of the wireless communication channel upon receipt of a second LTF symbol. The access point next determines a phase difference between the first phase and the second phase. Based on the determined phase difference, the access point determines a carrier frequency offset of the wireless communication channel. Lastly, the access point modifies the wireless communication channel based at least in part on the determined CFO. | 2016-05-19 |
20160142228 | CHANNEL MEASUREMENT METHOD FOR LARGE-SCALE ANTENNAS, AND USER TERMINAL - Provided are a channel measurement method for large-scale antennas, and a user terminal. The method comprises: antennas at a base station side are divided into more than two groups in advance, a user terminal receives pilot signals transmitted from the antennas at the base station side, where the antennas in one group transmit the pilot signals in a frequency-division mode, and the antennas in different groups transmit the pilot signals in a time-division mode; and the user terminal performs a spatial channel estimation based on the pilot signals received from partial groups of the antennas, to obtain a channel measurement result for all the antennas. | 2016-05-19 |
20160142229 | PROCESSING INTERFERENCE IN A WIRELESS NETWORK - Interference is processed in a waveform received at a device in a wireless network, the received interference comprising non-linear products of at least a first signal (C | 2016-05-19 |
20160142230 | POWER-EFFICIENT DIGITAL WIRELESS TRANSMITTER AND METHOD OF OPERATION THEREOF - A digital wireless transmitter and a method of transmitting a high-power modulated RF signal using a digital wireless transmitter. In one embodiment, the transmitter includes: (1) a digital system-on-a-chip configured to receive a complex digital input signal and having: (1a) an all-digital phase-locked loop and digital pulse modulator configured to modulate a phase and frequency modulation signal based on the complex digital input signal to yield a modulated complex signal, (1b) a driver configured to generate a pulse-position-modulated and pulse-width-modulated pulse train based on an instantaneous phase and amplitude of the modulated complex signal and (1c) a power supply modulation control block configured to develop an amplitude modulation control signal based on the complex digital input signal that defines a non-constant-envelope for an output signal of the transmitter. The all-digital phase-locked loop and digital pulse modulator and the power supply modulation control block respectively provide separate pulse-width modulation and power supply modulation functions that combine to yield a desired envelope for the output signal. | 2016-05-19 |
20160142231 | RECEIVER FRONT END ARCHITECTURE FOR INTRA BAND CARRIER AGGREGATION - A receiver front end architecture for intra band carrier aggregation is disclosed. In an exemplary embodiment, an apparatus includes a first transistor having a gate terminal to receive an input signal, drain terminal to output an amplified signal, and a source terminal connected to a signal ground by a source degeneration inductor. The apparatus also includes a second transistor having a source terminal connected to the drain terminal of the first transistor and a drain terminal connected to a first load. The apparatus also includes a third transistor having a gate terminal connected to the drain terminal of the first transistor, a drain terminal connected to a second load and a source terminal connected to a signal ground. | 2016-05-19 |
20160142232 | ENHANCING MODULATION AND CODING SCHEME SELECTION AND MEDIUM ACCESS CONTROL (MAC) PROTOCOL DATA UNIT AGGREGATION USING MAC EFFICIENCY INFORMATION - Methods, systems, and devices are described for wireless communications. More particularly, the described features relate to techniques for adjusting a modulation and coding scheme (MCS) to account for different airtime utilizations (available airtime actually utilized by a device for transmissions) resulting from different MCSs. In one example, a method for wireless communication may involve: determining a media access control (MAC) efficiency for a station of a plurality of stations based at least in part on a real-time multi-user (MU) physical protocol data unit (PPDU) length, a real-time physical layer service data unit (PSDU) length of each of the plurality of stations, and a modulation and coding scheme (MCS) of the station; adjusting a goodput estimate of the station using the MAC efficiency; and, adjusting the MCS of the station using the adjusted goodput estimate. | 2016-05-19 |
20160142233 | DATA RATE AND PVT ADAPTATION WITH PROGRAMMABLE BIAS CONTROL IN A SERDES RECEIVER - Described embodiments provide for, in a SerDes device, an adaptation process that adjusts data path gain through programmable-bias based on process, voltage, temperature (PVT) and data rate changes. Such adaptation process extends bias current dynamic range, and low frequency gain can be programmed to a desired target range of values for a given variable gain amplifier (VGA) setting at any PVT and data rate corner. A receive (RX) data path structure auto-adapts data path gain through programmable bias based on sensed PVT and data rate changes. The low frequency attenuation/gain range is extended, and can be programmed to a desirable targeted range by a SerDes device RX adaptive process for a given VGA and linear equalizer (LEQ) setting at any given PVT and data rate condition. | 2016-05-19 |
20160142234 | DEVICE FOR GENERATING A VECTOR-MODULATED OUTPUT SIGNAL AND METHOD FOR GENERATING A VECTOR-MODULATED OUTPUT SIGNAL - A device for generating a vector-modulated output signal based on a baseband signal having an in-phase component and a quadrature component, a first LO signal for the in-phase component of the baseband signal and a second LO signal for the quadrature component of the baseband signal comprises a baseband combination circuit, which is configured to combine the in-phase component and the quadrature component in order to obtain a plurality of combined IQ signals. Furthermore, the device includes a plurality of mixer cells for generating the vector-modulated output signal, based on the combined IQ signals, the first LO signal and the second LO signal. | 2016-05-19 |
20160142235 | SIGNAL PROCESSING METHOD, APPARATUS AND SIGNAL RECEIVER - The present application discloses a method for processing a signal. An apparatus detects, according to a check relationship set during a forward error correction coding, that a phase jump occurs in a data segment of a signal, and a quantity of degrees of the phase jump; performs, according to the quantity of degrees of the phase jump, a phase correction on the data segment; after the phase correction, performs a confidence correction on the data segment; and after the confidence correction, performs a forward error correction decision decoding on the data segment on which the confidence correction has been performed and output the data segment. | 2016-05-19 |
20160142236 | WEAK SIGNAL DETECTION IN DOUBLE TRANSMISSION - Disclosed is a method for the detection of more than one signals contained in a receive signal, the method comprising down-converting the receive signal, thereby providing a down-converted signal in a complex IQ base band; at least partially cancelling the strongest user in the down-converted signal, thereby allowing for the detection of a possible secondary user. | 2016-05-19 |
20160142237 | IMPLICIT SIGNALLING IN OFDM PREAMBLE WITH EMBEDDED SIGNATURE SEQUENCE, AND CYCLIC PREFIX AND POSTFIX AIDED SIGNATURE DETECTION - A transmitter transmitting payload data using Orthogonal Frequency Division Multiplexed (OFDM) symbols, including: a frame builder configured to receive the payload data and to receive signalling data to use in detecting and recovering the payload data at a receiver, and to form the payload data with the signalling data into frames for transmission; a modulator configured to modulate a first OFDM symbol with the signalling data and to modulate one or more second OFDM symbols with the payload data; a signature sequence processor circuit providing a signature sequence; a combiner circuit combining the signature sequence with the first OFDM symbol; a prefixing circuit prefixing a guard interval to the first OFDM symbol to form a preamble; and a transmission circuit transmitting the preamble and the one or more second OFDM symbols. The guard interval is formed from time domain samples of a part of the signature sequence. | 2016-05-19 |
20160142238 | Pilot Design for Wireless System - The description herein relates to pilot designs for an Orthogonal Frequency Division Multiplexing (OFDM) based communication system. In at least one embodiment, the communication system is one operating according to the IEEE 802.16m, or WiMax, standard. In general, an OFDM transmitter operates to insert pilot symbols into a resource of a transmit frame according to a predetermined staggered pilot symbol pattern defining pilot symbol locations within the resource of the transmit frame. The predetermined pilot symbol pattern is defined such that pilot symbols are located at or near time boundaries of the resource, at or near frequency boundaries of the resource, or both. By doing so, when generating a channel estimate for the communication channel between the OFDM transmitter and an OFDM receiver based on the pilot symbols, extrapolations needed to estimate the channel near the boundaries of the resource are optimized, thereby improving overall channel estimation accuracy. | 2016-05-19 |
20160142239 | DEVICES AND METHODS FOR HERMETIC TRANSFORM FILTERS - In one or more exemplary embodiments, a method comprises applying one or more first hermetic filters to an interval of data to produce one or more first filtered subintervals of data, wherein the one or more first hermetic filters are constructed from a hermetic function for the interval; and applying one or more second hermetic filters to the one or more first filtered subintervals of data to produce one or more second filtered subintervals of data, wherein the one or more second hermetic filters are constructed from a hermetic function for the one or more first filtered subintervals. | 2016-05-19 |
20160142240 | METHOD AND APPARATUS FOR MULTI-CARRIER MODULATION (MCM) PACKET DETECTION BASED ON PHASE DIFFERENCES - A method is disclosed for detecting packet at a receiving system in a Multi-Carrier Modulation (MCM) system. The method starts with receiving a signal at the receiving system. Then a deviation value of the signal is computed, where the deviation value is computed at least partially based on phase differences between some number of carriers in the preamble. The deviation value is compared with a threshold to determine whether a packet has been detected from the received signal. In response to the determination that a packet has been detected, a symbol offset is computed optionally, where the symbol offset indicates a number of sample points from a beginning of a symbol. | 2016-05-19 |
20160142241 | Cell Search Procedure Frame Format - According to some embodiments, a method of synchronizing a wireless device with a network node comprises receiving a radio subframe transmitted from the network node. The radio subframe comprises a first Primary Synchronization Signal (PSS) associated with a first Orthogonal Frequency Division Multiplexing (OFDM) symbol and paired with a first Secondary Synchronization Signal (SSS) associated with a second OFDM symbol. The radio subframe also comprises a second PSS associated with a third OFDM symbol and paired with a second SSS associated with a fourth OFDM symbol. The method further comprises detecting at least one of the first PSS and the second PSS within the radio subframe and detecting at least one of the first SSS and the second SSS within the radio subframe. The method determines system information associated with the network node based on the detected at least one PSS and the detected at least one SSS. | 2016-05-19 |
20160142242 | METHOD FOR IMPROVING SPECTRAL EFFICIENCY IN WI-FI OFDM SYSTEMS - Wireless networks that use orthogonal frequency division multiplexing require a receiving device to accurately acquire and maintain synchronization with a transmitting device with respect to carrier and sampling frequency for coherent demodulation. Described herein are techniques for enabling such synchronization using pilot signals with reduced transmission overhead. | 2016-05-19 |
20160142243 | CONFIGURING A NETWORK - Configuring a network is disclosed. A set of network requirements is received at an interaction agent. At least a portion of the set of network requirements is published to a system data store. The published network requirements are received at an application agent. The application agent has subscribed to the published network requirements published in the system data store. Device requirements for a plurality of network devices are published to the system data store. At least a portion of the published device requirements is received at a proxy agent. Native hardware instructions are generated based on the received device requirements to configure at least one of the plurality of network devices. | 2016-05-19 |
20160142244 | MOBILE COMPUTING DEVICE AND APPLICATION CONFIGURING SAME TO RAPIDLY PROVISION AND MONITOR SERVICES AND REDUNDANCY IN A NETWORK - Disclosed embodiments include applications, computing devices configured with the applications, and computer implemented methods to manage, set-up, configure and/or monitor Ethernet Virtual Private Line services. | 2016-05-19 |
20160142245 | METHOD FOR ENHANCING MACHINE TYPE COMMUNICATION BETWEEN A MOBILE COMMUNICATION NETWORK ON THE ONE HAND, AND A PLURALITY OF MACHINE TYPE COMMUNICATION DEVICES ON THE OTHER HAND - A method for enhancing machine type communication between a mobile communication network and a plurality of machine type communication devices includes, in case that a radio connection between a first machine type communication device and a base station entity is dysfunctional: transmitting, in a first step, an emergency mode message from the first machine type communication device to at least one further machine type communication device; transmitting, in a second step, machine type communication data of the first machine type communication device to the at least one further machine type communication device via a communication link between the first machine type communication device and the at least one further machine type communication device; and storing, in a third step subsequent to the second step, the machine type communication data of the first machine type communication device in a memory of the at least one further machine type communication device. | 2016-05-19 |
20160142246 | Method and system for virtual network mapping protection and computer storage medium - Provided are a method and system for protecting virtual network mapping, and a computer storage medium; wherein the method includes that an application layer edits and defines at least one sub-network model based on a network editing request; a network virtualization layer constructs the at least one sub-network model, and integrates the at least one sub-network model into a global network view; and a controller layer respectively maps the at least one sub-network model contained in the global network view into a working device network and a protection device network, and when the working device network has failures, specified conditions are met, and the protection device network has no failure, switches a working mapping relationship of the corresponding sub-network from the working device network to the protection device network. | 2016-05-19 |
20160142247 | LOCAL NETWORK AND METHOD OF UPDATING A DEVICE IN A LOCAL NETWORK - A method of updating at least two interconnected devices in a local network, a local network comprising at least two interconnected devices and a method of operating a remote management client and a device in this local network are provided. A resource location information of an update archive is communicated from a remote management client in the local network to the other devices in said network. The devices participating in the update communicate participation acknowledgement messages to the remote management client. The participating devices determine whether a next one of a pre-defined sequence of update statuses is reached. They notify the other participating devices that this update status has been reached and pause until all other participating devices have notified that they also have reached the same update status. | 2016-05-19 |
20160142248 | USING BIT INDEX EXPLICIT REPLICATION (BIER) IN LOW-POWER AND LOSSY NETWORKS - In one embodiment, a first node in a network receives one or more bitmaps from one or more child nodes of the first node according to a directed acyclic graph (DAG). Each of the one or more child nodes is associated with a corresponding unique bit position in the one or more bitmaps. The first node stores, in a forwarding table, the one or more bitmaps received from the one or more child nodes of the first node. The first node receives a message that includes a destination bitmap that identifies one or more destinations of the message via one or more set bits at bit positions associated with the one or more child nodes. The first node forwards the message towards the identified one or more destinations based on the destination bitmap and the one or more bitmaps stored in the forwarding table of the first node. | 2016-05-19 |
20160142249 | METHOD, MEDIUM, AND SYSTEM FOR CONFIGURING A NEW NODE IN A DISTRIBUTED MEMORY NETWORK - A provisioned node, which is to be added into a distributed memory network, creates an empty provisioned key/value map. A master node, which is an existing node, in the distributed memory network, maintains existing key/value entries in an existing key/value map. An update cycle is performed, which includes receiving, by the master node and the provisioned node, one or more changes to the existing key/value entries. For any change that is a remove operation, the provisioned node stores a key specified in the remove operation in a tombstone set, and further removes the specified key from the provisioned key/value map. For any change that is a put operation of a specified key/value pair, the provisioned node puts the key/value pair in the provisioned key/value map. | 2016-05-19 |
20160142250 | SYSTEM AND METHOD FOR AUTOMATED NETWORK CONFIGURATION - A method of configuring a data network with a controller, the data network including a plurality of hosts each associated with at least one of a plurality of switches, the method including receiving a request to boot an operating system image on one of the plurality of hosts, the operating system image having network connectivity requirements. Further, the method includes selecting a host out of the plurality of hosts on which to boot the operating system image. The method also includes booting the operating system image on the host, and configuring a switch out of the plurality of switches associated with the host based upon the network connectively requirements of the operating system image. Additionally, the method includes configuring networking attributes of a network interface in the host based upon the network connectivity requirements of the operating system image. | 2016-05-19 |
20160142251 | NETWORK CONTROLLER AND A COMPUTER IMPLEMENTED METHOD FOR AUTOMATICALLY DEFINE FORWARDING RULES TO CONFIGURE A COMPUTER NETWORKING DEVICE - A network controller and a method for automatically define forwarding rules to configure a computer networking device, | 2016-05-19 |
20160142252 | HealthCheck Access Point - A wireless configuration network may be provided by a Wi-Fi hotspot active at the wireless access station. The Wi-Fi hotspot may be connected to by a wireless network-capable device, such as a tablet computer, e.g., an Apple iPad, or a Wi-Fi enabled smartphone, e.g., an Android or Apple iOS device. This allows a technician to stand on the ground below the wireless access station but still have access to various configuration features of the wireless access station. The wireless configuration network may also be referred to herein as a “debug SSID” or a “debug access point.” | 2016-05-19 |
20160142253 | APPLICATION PLACEMENT THROUGH MULTIPLE ALLOCATION DOMAIN AGENTS AND FLEXIBLE CLOUD SCHEDULER FRAMEWORK - There are provided a method for operating a cloud computing infrastructure. In one embodiment, the method performs allocation domain modeling and provides a cloud scheduler framework that takes as input desired optimization objectives and the workload constraints and efficiently produces a placement solution that satisfies the constraints while optimizing the objectives in a way that adjusts itself depending on the objectives. As the objectives change, e.g., due to actions from system administrators or due to changes in business policies, the system optimizes itself accordingly and still produces efficient and optimized placement solutions. The method constructs an Allocation Domain (AD) that is a particular facet for allocating a logical entity to a physical entity. An AD is created using: variables, functional definitions (functions of variables), and a policy specification that includes a Boolean expression (of the functional definitions). | 2016-05-19 |
20160142254 | MANAGING COMMUNICATIONS BETWEEN COMPUTING NODES - Techniques are described for managing communications between multiple intercommunicating computing nodes, such as multiple virtual machine nodes hosted on one or more physical computing machines or systems. In some situations, users may specify groups of computing nodes and optionally associated access policies for use in the managing of the communications for those groups, such as by specifying which source nodes are allowed to transmit data to particular destinations nodes. In addition, determinations of whether initiated data transmissions from source nodes to destination nodes are authorized may be dynamically negotiated for and recorded for later use in automatically authorizing future such data transmissions without negotiation. This abstract is provided to comply with rules requiring an abstract, and it is submitted with the intention that it will not be used to interpret or limit the scope or meaning of the claims. | 2016-05-19 |
20160142255 | ROBUST ON-LINE RECONFIGURATION (OLR) AND SYNCHRONIZATION PROTOCOL FOR DIGITAL SUBSCRIBER LINE (DSL) - A method for maintaining configuration synchronization via an on-line reconfiguration (OLR) of system configuration parameters in a communication system having at least a first communication entity and a second communication entity that employ a reference configuration of system parameters, the method comprising the procedures of monitoring changes to at least one channel characteristic in at least one communication channel that links the first communication entity and the second communication entity; determining by the first communication entity an updated configuration that is constructed based on at least one modification relative to the reference configuration according to changes to the at least one channel characteristic; transmitting an OLR request from the first communication entity to the second communication entity via the at least one communication channel; receiving the OLR request by the second communication entity, and employing the updated configuration by the first communication entity and by the second communication entity. | 2016-05-19 |
20160142256 | AUTOMATICALLY RECOMMENDING POINT OF PRESENCE CENTERS - Techniques for automatically recommending a new data center, such as a point-of-presence (POP) center are provided. In one technique, multiple candidate locations for a new POP center are considered. An impact of adding a new POP to each candidate location is estimated and a score is generated. Each candidate location is ranked based on the score. In a related technique, an impact score for a candidate location is based on a prediction of whether and how much a new POP center at the candidate location would reduce response times of clients that would connect to the new POP center. The prediction may be based on a model that is generated based on response data generated by clients that are connecting to existing POP centers. The model may take into account multiple factors, such as geographic distance, network distance, type of browser executing on the clients, type of operating system, etc. | 2016-05-19 |
20160142257 | PERIODIC ADVERTISEMENTS OF HOST CAPABILITIES IN VIRTUAL CLOUD COMPUTING INFRASTRUCTURE - The present disclosure describes a distributed, advertisement-based, solution for scheduling virtual resources in cloud infrastructures such as the OpenStack. The scheduling algorithm distributes the scheduling requirements and host state feasibility checks to the individual hosts in the datacenter, which can periodically send a summarized advertisement to the scheduler controller listing the number of instances of different type(s) of virtual resources that a particular host can support. The scheduler controller, thus no longer has to compute and maintain individual host states, and the scheduling problem is reduced to selecting the feasible advertisements that satisfy a given request. The solution can be extended to a scenario of multiple scheduler controllers using the same distributed, advertisement-based, approach. | 2016-05-19 |
20160142258 | METHODS AND SYSTEMS FOR VERIFYING INSTALLATION OF A DEVICE - Methods and systems for verifying installation of a networked device are disclosed. Short message service (SMS) messages are used to communicate between an in-field device and a central computer system after an installation of a network device. The in-field device request an installation verification process be executed by the central computer system. The central computer system first requests an installation number from the in-field device, and then contacts a gateway networked to the network device to perform an installation verification test. The results of the test are sent to the in-field device via SMS. | 2016-05-19 |
20160142259 | SYSTEM AND METHOD FOR DISCOVERY OF DEVICES ON A NETWORK - A connection is established between a first device and a server. When the first device opens the connection, the server determines the remote IP address of the first device. Determining the remote IP address can be performed in a variety of different manners. The first device is then tasked to determine its local IP address. The same steps can be repeated with a second device. Thereafter, either of the first device or the second device are able to query the server to find out if there is another device on the network. If one of the devices is capable of accepting incoming connections, the devices can communicate directly using the local IP addresses. Otherwise, messages can be sent through the server. The communication between the first and second devices can allow enhanced media viewing capabilities. Other embodiments are also disclosed herein. | 2016-05-19 |
20160142260 | SYSTEMS AND METHODS FOR PROCESSING PACKETS TAPPED FROM A NETWORK USING DISCOVERY PROTOCOL - A network device includes: one or more ports for tapping to a network; and a processing unit configured for receiving a first packet tapped from the network, wherein the first packet is received at a first network port of the network device; determining a first identity of a first network equipment associated with the first packet based on a discovery protocol; and associating the first identity of the first network equipment with a first identity of the first network port of the network device at which the first packet is received; and a non-transitory medium for storing the first identity of the first network equipment and the first identity of the first network port in association with each other. | 2016-05-19 |
20160142261 | CONTEXT AWARE DYNAMIC COMPOSITION OF MIGRATION PLANS TO CLOUD - Context aware dynamic composition of migration plans may be provided. A request for application or image migration may be received. Target machines and associated configuration may be identified. Resources and a schedule may be allocated. An appropriate tooling for each migration action may be selected. An artificial intelligence aspect of the migration planning process may continuously replan migration based on monitored changes in the context of source or target environment. | 2016-05-19 |
20160142262 | MONITORING A COMPUTING NETWORK - A computer-implemented method of monitoring a computing network includes identifying a topology pattern in a computing network. The method also includes assigning a management template for a configuration item type of the topology-pattern. The method further includes applying the management template to a configuration item instance of the configuration item type. | 2016-05-19 |
20160142263 | METHOD FOR CONFIGURING A NODE AND A NODE CONFIGURED THEREFORE - The invention relates a wireless node and to a method for operating the wireless node, wherein the wireless node comprises a controller arranged for communicating wirelessly with at least one further wireless node so as to determine an ability of the wireless node and to create a network, wherein a characteristic of the network depends on the ability of the wireless node. | 2016-05-19 |
20160142264 | DEVICE RECOGNITION AND MANAGEMENT - Embodiments of the present invention relate to network management and discovery. In an embodiment, the present invention is a method of detecting and/or managing devices in a Device Level Ring (DLR) network. The method allows a user to obtain a visual representation of a logical ring of a DLR network, accurately and effectively illustrating the presence of physical links between network participants. | 2016-05-19 |
20160142265 | SYSTEMS AND METHODS FOR SCALING A CLOUD INFRASTRUCTURE - A method for scaling a cloud infrastructure, comprises receiving at least one of resource-level metrics and application-level metrics, estimating parameters of at least one application based on the received metrics, automatically and dynamically determining directives for scaling application deployment based on the estimated parameters, and providing the directives to a cloud service provider to execute the scaling. | 2016-05-19 |
20160142266 | EXTRACTING DEPENDENCIES BETWEEN NETWORK ASSETS USING DEEP LEARNING - A network analysis tool receives network flow information and uses deep learning—machine learning that models high-level abstractions in the network flow information—to identify dependencies between network assets. Based on the identified dependencies, the network analysis tool can discover functional relationships between network assets. For example, a network analysis tool receives network flow information, identifies dependencies between multiple network assets based on evaluation of the network flow information, and outputs results of the identification of the dependencies. When evaluating the network flow information, the network analysis tool can pre-process the network flow information to produce input vectors, use deep learning to extract patterns in the input vectors, and then determine dependencies based on the extracted patterns. The network analysis tool can repeat this process so as to update an assessment of the dependencies between network assets on a near real-time basis. | 2016-05-19 |
20160142267 | MODIFIED NEAR-OPTIMAL LOW-LATENCY COMMUNICATION PATHS FOR GRADED SERVICE - In described embodiments, a relatively optimum, ultra-low latency communication path with communication links operating in accordance herein provide for graded service in a near optimal, ultra-low latency communication system between points A and B. Points A and B are separated geographically over a relatively long distance where the curvature of the earth affects a direct path. Unlike typical systems, to provide the graded service in ultra-low latency networks, the service provider adds delay, or other service degradation, to one or more user connections, which is provided at greater implementation expense (e.g., higher cost to the service provider) in order to provide a lower fee service (e.g., lower cost to the service user) for certain users of the ultra-low latency network. | 2016-05-19 |
20160142268 | RESOURCE ALLOCATION FOR MIGRATION WITHIN A MULTI-TIERED SYSTEM - A method and system for intelligent tiering is provided. The method includes receiving a request for enabling a tiering process with respect to data. The computer processor retrieves a migration list indicating migration engines associated with the data. Additionally, an entity list of migration entities is retrieved and each migration entity is compared to associated policy conditions. In response, it is determined if matches exist between the migration entities and the associated policy conditions and a consolidated entity list is generated. | 2016-05-19 |
20160142269 | Inline Packet Tracing in Data Center Fabric Networks - Presented herein are embodiments for tracing paths of packet flows in a data center fabric network. Filters are configured on nodes (e.g., switches) in the data center fabric network for a particular packet flow. Numerous such filters can be configured on each of the switches, each filter for a different packet flow. When a filter detects a match, it sends a log of such occurrence to a network controller. The network controller uses log data sent from nodes as well as knowledge of the network topology (updated as changes occur in the network) to determine the path for a particular packet flow in the data center fabric network. This technique works inline on the actual packet flow and does not need additional debug packets to be injected. This technique can also quickly point out the problem node in case of traffic drop. | 2016-05-19 |
20160142270 | ANALYZING DATA SOURCES FOR INACTIVE DATA - According to embodiments of the present invention, machines, systems, methods and computer program products for analyzing data sources for inactive data are presented. Data accesses within one or more data sources are monitored, and data access information is generated based on the monitored data accesses, wherein the data access information indicates accessed and non-accessed data within the one or more data sources. The data access information is applied to a profile to identify inactive data within the one or more data sources, wherein the profile includes one or more criteria for determining inactive data including a time interval for data access. Notifications of the identified inactive data within the one or more data sources are generated. | 2016-05-19 |
20160142271 | Predicting Performance by Analytically Solving a Queueing Network Model - An approach is provided for predicting system performance. The approach operates by identifying a Queuing Network Model (QNM) corresponding to an information technology (IT) environment that includes a number of servers that perform a plurality of parallel services. The QNM is transformed to a linear model by serializing the parallel services as sequential services. Hardware based service demands are retrieved from the system. Software-based service demands are inferred from the hardware-based service demands. Predicted performance results of the IT environment are calculated based on the hardware-based service demands, the software-based service demands inferred from the hardware-based service demands, and the system transaction rate of the system. | 2016-05-19 |
20160142272 | NON-COMMITTAL VISITOR STITCHING - Techniques are provided for transforming information about unique visits to a website or interactions with a mobile application by a single individual on different devices into unified analytical data representing these visits. One or more visitor stitching models can be used to quantify unique visits as belonging to the same person with a certain level of confidence. In addition to maintaining separate records for each unique visit, a unified record is generated, which represents a combination of the unique visits by the same person. Various analytics can then be performed on the unique and unified records. The unified records are favored over the separate data records wherever the stitching model corresponding to the unified record provides a certainty that meets or exceeds a user-specified confidence level. The visitor stitching model used for the analytics is considered non-committal because different models can be employed or none at all, depending on user preferences. | 2016-05-19 |
20160142273 | SYSTEMS AND METHODS FOR EXTRACTING MEDIA FROM NETWORK TRAFFIC HAVING UNKNOWN PROTOCOLS - Methods and systems for analyzing network traffic. An analysis system receives network traffic, which complies with a certain protocol. The received network traffic carries a data item, which may be of value to an analyst. In order to access the data item in question, the analysis system automatically identifies the media type of the data item, by processing the network traffic without decoding the protocol. The analysis system identifies the media type irrespective of the protocol in order to avoid the computational complexity involved in decoding the protocol. | 2016-05-19 |